A New RSA-Based Signature Scheme Sven Sch age, J org Schwenk - - PowerPoint PPT Presentation

a new rsa based signature scheme
SMART_READER_LITE
LIVE PREVIEW

A New RSA-Based Signature Scheme Sven Sch age, J org Schwenk - - PowerPoint PPT Presentation

A New RSA-Based Signature Scheme Sven Sch age, J org Schwenk Horst G ortz Institute for IT-Security Africacrypt 2010 1 / 13 RSA-Based Signature Schemes Na ve RSA signature scheme not secure under the standard definition of


slide-1
SLIDE 1

A New RSA-Based Signature Scheme

Sven Sch¨ age, J¨

  • rg Schwenk

Horst G¨

  • rtz Institute for IT-Security

Africacrypt 2010

1 / 13

slide-2
SLIDE 2

RSA-Based Signature Schemes

Na¨ ıve RSA signature scheme not secure under the standard definition of security – adaptive chosen message attacks [GMR99].

2 / 13

slide-3
SLIDE 3

RSA-Based Signature Schemes

Na¨ ıve RSA signature scheme not secure under the standard definition of security – adaptive chosen message attacks [GMR99]. RSA assumption is weaker than popular Strong RSA (SRSA)

  • assumption. In contrast to SRSA: adversary is not allowed to

choose from an exponentially large set of solutions.

2 / 13

slide-4
SLIDE 4

RSA-Based Signature Schemes

Na¨ ıve RSA signature scheme not secure under the standard definition of security – adaptive chosen message attacks [GMR99]. RSA assumption is weaker than popular Strong RSA (SRSA)

  • assumption. In contrast to SRSA: adversary is not allowed to

choose from an exponentially large set of solutions. Only recently, in CRYPTO’09, Hohenberger and Waters (HW) presented the first hash-and-sign signature scheme that is solely secure under the RSA assumption.

2 / 13

slide-5
SLIDE 5

RSA-Based Signature Schemes

Na¨ ıve RSA signature scheme not secure under the standard definition of security – adaptive chosen message attacks [GMR99]. RSA assumption is weaker than popular Strong RSA (SRSA)

  • assumption. In contrast to SRSA: adversary is not allowed to

choose from an exponentially large set of solutions. Only recently, in CRYPTO’09, Hohenberger and Waters (HW) presented the first hash-and-sign signature scheme that is solely secure under the RSA assumption. In this work: alternative RSA-based signature scheme with additional properties that are useful in privacy preserving systems.

2 / 13

slide-6
SLIDE 6

Observations

A single HW signature can be interpreted as a combination of several Gennaro-Halevi-Rabin signatures. (Observation 1)

3 / 13

slide-7
SLIDE 7

Observations

A single HW signature can be interpreted as a combination of several Gennaro-Halevi-Rabin signatures. (Observation 1) The SRSA-based Camenisch-Lysyanskaya (CL) scheme has proven very useful in many privacy preserving systems. Popular examples: Direct Anonymous Attestation (DAA), compact E-Cash. (Observation 2)

3 / 13

slide-8
SLIDE 8

Observations

A single HW signature can be interpreted as a combination of several Gennaro-Halevi-Rabin signatures. (Observation 1) The SRSA-based Camenisch-Lysyanskaya (CL) scheme has proven very useful in many privacy preserving systems. Popular examples: Direct Anonymous Attestation (DAA), compact E-Cash. (Observation 2) Three useful properties of CL scheme:

3 / 13

slide-9
SLIDE 9

Observations

A single HW signature can be interpreted as a combination of several Gennaro-Halevi-Rabin signatures. (Observation 1) The SRSA-based Camenisch-Lysyanskaya (CL) scheme has proven very useful in many privacy preserving systems. Popular examples: Direct Anonymous Attestation (DAA), compact E-Cash. (Observation 2) Three useful properties of CL scheme:

1

Signature scheme supports signing several message blocks.

3 / 13

slide-10
SLIDE 10

Observations

A single HW signature can be interpreted as a combination of several Gennaro-Halevi-Rabin signatures. (Observation 1) The SRSA-based Camenisch-Lysyanskaya (CL) scheme has proven very useful in many privacy preserving systems. Popular examples: Direct Anonymous Attestation (DAA), compact E-Cash. (Observation 2) Three useful properties of CL scheme:

1

Signature scheme supports signing several message blocks.

2

There exist efficient (NIZK) protocols (in the ROM) to sign commited values.

3 / 13

slide-11
SLIDE 11

Observations

A single HW signature can be interpreted as a combination of several Gennaro-Halevi-Rabin signatures. (Observation 1) The SRSA-based Camenisch-Lysyanskaya (CL) scheme has proven very useful in many privacy preserving systems. Popular examples: Direct Anonymous Attestation (DAA), compact E-Cash. (Observation 2) Three useful properties of CL scheme:

1

Signature scheme supports signing several message blocks.

2

There exist efficient (NIZK) protocols (in the ROM) to sign commited values.

3

There exist efficient (NIZK) protocols (in the ROM) for proving knowledge of a signature without revealing it.

3 / 13

slide-12
SLIDE 12

Idea and Construction

Idea: Combine Observation 1 & Observation 2

4 / 13

slide-13
SLIDE 13

Idea and Construction

Idea: Combine Observation 1 & Observation 2

Construct signatures that can be interpreted as the combination of several CL signatures. Perhaps the decisive properties of the CL scheme can still be found in the new construction!

4 / 13

slide-14
SLIDE 14

Idea and Construction

Idea: Combine Observation 1 & Observation 2

Construct signatures that can be interpreted as the combination of several CL signatures. Perhaps the decisive properties of the CL scheme can still be found in the new construction!

Technique:

4 / 13

slide-15
SLIDE 15

Idea and Construction

Idea: Combine Observation 1 & Observation 2

Construct signatures that can be interpreted as the combination of several CL signatures. Perhaps the decisive properties of the CL scheme can still be found in the new construction!

Technique:

Starting point CL scheme: CL proof considers three types of forgery.

4 / 13

slide-16
SLIDE 16

Idea and Construction

Idea: Combine Observation 1 & Observation 2

Construct signatures that can be interpreted as the combination of several CL signatures. Perhaps the decisive properties of the CL scheme can still be found in the new construction!

Technique:

Starting point CL scheme: CL proof considers three types of forgery. Key observation: two of these forgeries already reduce security to the RSA assumption.

4 / 13

slide-17
SLIDE 17

Idea and Construction

Idea: Combine Observation 1 & Observation 2

Construct signatures that can be interpreted as the combination of several CL signatures. Perhaps the decisive properties of the CL scheme can still be found in the new construction!

Technique:

Starting point CL scheme: CL proof considers three types of forgery. Key observation: two of these forgeries already reduce security to the RSA assumption. Remaining type of forgery can be dealt with using the new proving techniques of HW.

4 / 13

slide-18
SLIDE 18

Idea and Construction

Idea: Combine Observation 1 & Observation 2

Construct signatures that can be interpreted as the combination of several CL signatures. Perhaps the decisive properties of the CL scheme can still be found in the new construction!

Technique:

Starting point CL scheme: CL proof considers three types of forgery. Key observation: two of these forgeries already reduce security to the RSA assumption. Remaining type of forgery can be dealt with using the new proving techniques of HW. In particular: integrate that for a string X all prefixes of X are processed as well.

4 / 13

slide-19
SLIDE 19

Idea and Construction

Idea: Combine Observation 1 & Observation 2

Construct signatures that can be interpreted as the combination of several CL signatures. Perhaps the decisive properties of the CL scheme can still be found in the new construction!

Technique:

Starting point CL scheme: CL proof considers three types of forgery. Key observation: two of these forgeries already reduce security to the RSA assumption. Remaining type of forgery can be dealt with using the new proving techniques of HW. In particular: integrate that for a string X all prefixes of X are processed as well. Modified scheme still allows to reduce the first two forgeries to the RSA assumption (although the proof is slightly more complicated).

4 / 13

slide-20
SLIDE 20

Contribution: New Signature Scheme with Useful Properties for Anonymity Preserving Systems

Advantages Disadvantages

5 / 13

slide-21
SLIDE 21

Contribution: New Signature Scheme with Useful Properties for Anonymity Preserving Systems

Advantages

New scheme supports signing several message blocks

Disadvantages

5 / 13

slide-22
SLIDE 22

Contribution: New Signature Scheme with Useful Properties for Anonymity Preserving Systems

Advantages

New scheme supports signing several message blocks New scheme allows to sign commited values

Disadvantages

5 / 13

slide-23
SLIDE 23

Contribution: New Signature Scheme with Useful Properties for Anonymity Preserving Systems

Advantages

New scheme supports signing several message blocks New scheme allows to sign commited values Proof technique can be transferred to Cramer-Shoup, Fischlin and Zhou signature scheme ⇒ Several new RSA-based signature schemes!

Disadvantages

5 / 13

slide-24
SLIDE 24

Contribution: New Signature Scheme with Useful Properties for Anonymity Preserving Systems

Advantages

New scheme supports signing several message blocks New scheme allows to sign commited values Proof technique can be transferred to Cramer-Shoup, Fischlin and Zhou signature scheme ⇒ Several new RSA-based signature schemes!

Disadvantages

Signatures are larger than in HW (by just a single exponent)

5 / 13

slide-25
SLIDE 25

Contribution: New Signature Scheme with Useful Properties for Anonymity Preserving Systems

Advantages

New scheme supports signing several message blocks New scheme allows to sign commited values Proof technique can be transferred to Cramer-Shoup, Fischlin and Zhou signature scheme ⇒ Several new RSA-based signature schemes!

Disadvantages

Signatures are larger than in HW (by just a single exponent) Signature generation and verification take more time

5 / 13

slide-26
SLIDE 26

Contribution: New Signature Scheme with Useful Properties for Anonymity Preserving Systems

Advantages

New scheme supports signing several message blocks New scheme allows to sign commited values Proof technique can be transferred to Cramer-Shoup, Fischlin and Zhou signature scheme ⇒ Several new RSA-based signature schemes!

Disadvantages

Signatures are larger than in HW (by just a single exponent) Signature generation and verification take more time Until now: No efficient (NIZK) protocols for proving knowledge of a signature without revealing it. – Future Work!

5 / 13

slide-27
SLIDE 27

Related Work

RSA-based signature schemes in the standard model

6 / 13

slide-28
SLIDE 28

Related Work

RSA-based signature schemes in the standard model

Tree-based signature schemes (Dwork-Noar CRYPTO’94 and more efficient Cramer-Damgard CRYPTO’96)

6 / 13

slide-29
SLIDE 29

Related Work

RSA-based signature schemes in the standard model

Tree-based signature schemes (Dwork-Noar CRYPTO’94 and more efficient Cramer-Damgard CRYPTO’96) Stateful signature scheme (Hohenberger-Waters EC’09)

6 / 13

slide-30
SLIDE 30

Related Work

RSA-based signature schemes in the standard model

Tree-based signature schemes (Dwork-Noar CRYPTO’94 and more efficient Cramer-Damgard CRYPTO’96) Stateful signature scheme (Hohenberger-Waters EC’09) HW (CRYPTO’09)

6 / 13

slide-31
SLIDE 31

Related Work

RSA-based signature schemes in the standard model

Tree-based signature schemes (Dwork-Noar CRYPTO’94 and more efficient Cramer-Damgard CRYPTO’96) Stateful signature scheme (Hohenberger-Waters EC’09) HW (CRYPTO’09)

RSA-like (i.e. SRSA-based) hash-and-sign signature schemes in the standard model

6 / 13

slide-32
SLIDE 32

Related Work

RSA-based signature schemes in the standard model

Tree-based signature schemes (Dwork-Noar CRYPTO’94 and more efficient Cramer-Damgard CRYPTO’96) Stateful signature scheme (Hohenberger-Waters EC’09) HW (CRYPTO’09)

RSA-like (i.e. SRSA-based) hash-and-sign signature schemes in the standard model

Gennaro-Halevi-Rabin (EC’99)

6 / 13

slide-33
SLIDE 33

Related Work

RSA-based signature schemes in the standard model

Tree-based signature schemes (Dwork-Noar CRYPTO’94 and more efficient Cramer-Damgard CRYPTO’96) Stateful signature scheme (Hohenberger-Waters EC’09) HW (CRYPTO’09)

RSA-like (i.e. SRSA-based) hash-and-sign signature schemes in the standard model

Gennaro-Halevi-Rabin (EC’99) Cramer-Shoup (ACM Trans. Inf. Syst. Sec.’00)

6 / 13

slide-34
SLIDE 34

Related Work

RSA-based signature schemes in the standard model

Tree-based signature schemes (Dwork-Noar CRYPTO’94 and more efficient Cramer-Damgard CRYPTO’96) Stateful signature scheme (Hohenberger-Waters EC’09) HW (CRYPTO’09)

RSA-like (i.e. SRSA-based) hash-and-sign signature schemes in the standard model

Gennaro-Halevi-Rabin (EC’99) Cramer-Shoup (ACM Trans. Inf. Syst. Sec.’00) Zhou (Chin. Journ. of Elec.’01), Camenisch-Lysyankaya (SCN’02), Fischlin (PKC’03),

6 / 13

slide-35
SLIDE 35

Complexity Assumption

Definition (RSA assumption (RSA) ) Given an RSA modulus n = pq, where p, q are sufficiently large primes, a prime α < φ(n) with gcd(α, φ(n)) = 1, and an element u ∈ Z∗

n, we

say that the (tRSA, ǫRSA)-RSA assumption holds if for all tRSA-time adversaries A Pr [(x) ← A(n, u, α), x ∈ Z∗

n, xα = u mod n] ≤ ǫRSA,

where the probability is over the random choices of u, n, α and the random coins of A.

7 / 13

slide-36
SLIDE 36

Prime Mapping Function t(X)

Very similar to HW except that prime mapping function may not be compressive!

8 / 13

slide-37
SLIDE 37

Prime Mapping Function t(X)

Very similar to HW except that prime mapping function may not be compressive! Ingredients:

8 / 13

slide-38
SLIDE 38

Prime Mapping Function t(X)

Very similar to HW except that prime mapping function may not be compressive! Ingredients:

pseudo-random permutation fk : {0, 1}lX → {0, 1}lX with key k.

8 / 13

slide-39
SLIDE 39

Prime Mapping Function t(X)

Very similar to HW except that prime mapping function may not be compressive! Ingredients:

pseudo-random permutation fk : {0, 1}lX → {0, 1}lX with key k. random value s ∈R {0, 1}lX.

8 / 13

slide-40
SLIDE 40

Prime Mapping Function t(X)

Very similar to HW except that prime mapping function may not be compressive! Ingredients:

pseudo-random permutation fk : {0, 1}lX → {0, 1}lX with key k. random value s ∈R {0, 1}lX.

Prime mapping function t: t(X) := nextprime(s ⊕ fk(X))

8 / 13

slide-41
SLIDE 41

Prime Mapping Function t(X)

Very similar to HW except that prime mapping function may not be compressive! Ingredients:

pseudo-random permutation fk : {0, 1}lX → {0, 1}lX with key k. random value s ∈R {0, 1}lX.

Prime mapping function t: t(X) := nextprime(s ⊕ fk(X)) Let X ∈ {0, 1}lX and define X(i) := 0lX−ix1 . . . xi ∈ {0, 1}lX for all i ∈ [lX]. (Prefix of X that consists of the first i bits). For convenience: T(X) :=

lX

  • i=1

t(X(i))

8 / 13

slide-42
SLIDE 42

Prime Mapping Function t(X)

Very similar to HW except that prime mapping function may not be compressive! Ingredients:

pseudo-random permutation fk : {0, 1}lX → {0, 1}lX with key k. random value s ∈R {0, 1}lX.

Prime mapping function t: t(X) := nextprime(s ⊕ fk(X)) Let X ∈ {0, 1}lX and define X(i) := 0lX−ix1 . . . xi ∈ {0, 1}lX for all i ∈ [lX]. (Prefix of X that consists of the first i bits). For convenience: T(X) :=

lX

  • i=1

t(X(i)) Lemma[HW]: Given q = q(κ) distinct input values, the probability that t(X) collides is negligible.

8 / 13

slide-43
SLIDE 43

A New RSA-Based Signature Scheme S (slightly simplified)

Gen(1κ): computes a balanced and safe RSA modulus n = pq and three random generators e, f, g of QRn. Additionally, it draws k ∈R K and s ∈R {0, 1}lX. PK = (n, e, f, g, k, s), SK = (p, q).

9 / 13

slide-44
SLIDE 44

A New RSA-Based Signature Scheme S (slightly simplified)

Gen(1κ): computes a balanced and safe RSA modulus n = pq and three random generators e, f, g of QRn. Additionally, it draws k ∈R K and s ∈R {0, 1}lX. PK = (n, e, f, g, k, s), SK = (p, q). Sign(SK, m): chooses r ∈R {0, 1}lr and X ∈R {0, 1}lX: z = (efmgr)1/T(X) mod n. The final signature is σ = (z, X, r)

9 / 13

slide-45
SLIDE 45

A New RSA-Based Signature Scheme S (slightly simplified)

Gen(1κ): computes a balanced and safe RSA modulus n = pq and three random generators e, f, g of QRn. Additionally, it draws k ∈R K and s ∈R {0, 1}lX. PK = (n, e, f, g, k, s), SK = (p, q). Sign(SK, m): chooses r ∈R {0, 1}lr and X ∈R {0, 1}lX: z = (efmgr)1/T(X) mod n. The final signature is σ = (z, X, r) Verify(PK, m, σ): checks if it holds for (z, X, r) that zT(X) ? = efmgr mod n.

9 / 13

slide-46
SLIDE 46

Security

Theorem Assume the (tRSA, ǫRSA)-RSA assumption holds. Then, S is (q, t, ǫ)-secure against adaptive chosen message attacks provided that q = qRSA, t ≈ tRSA, ǫ ≤ 9qlXǫRSA/2 + negl(κ).

10 / 13

slide-47
SLIDE 47

Signing Message Blocks

Gen(1κ): is the same as in our main RSA scheme except that it now chooses u + 2 generators e, f1, . . . , fu, g of QRn. Sign(SK, m1, . . . , mu, ): to sign a message the signer draws random values r ∈ {0, 1}lr and X ∈ {0, 1}lX. Next, it computes z =

  • egr

u

  • i=1

fmi

i

1/T(X) mod n. The final signature is σ = (z, X, r) Verify(PK, m1, . . . , mu, σ): to verify a signature (z, X, r) the verifier checks whether zT(X) ? = egr

u

  • i=1

fmi

i

mod n.

11 / 13

slide-48
SLIDE 48

Protocol for Signing Commited Values

Interactive ZK protocol between signer s and user u.

12 / 13

slide-49
SLIDE 49

Protocol for Signing Commited Values

Interactive ZK protocol between signer s and user u. Very similar to protocol for CL.

12 / 13

slide-50
SLIDE 50

Protocol for Signing Commited Values

Interactive ZK protocol between signer s and user u. Very similar to protocol for CL. Idea: if u successfully proves knowledge of a commited value m, then s processes the corresponding commitment such that the result is a signature on m.

12 / 13

slide-51
SLIDE 51

The End

Thank you for your attention. Any questions?

13 / 13